By Topic

Notice of Violation of IEEE Publication Principles
Security risk analysis for cloud computing systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Mukhin, V. ; Nat. Tech. Univ. of Ukraine Kiev Polytech. Inst., Kiev, Ukraine ; Volokyta, A.

Notice of Violation of IEEE Publication Principles

"Security Risk Analysis for Cloud Computing Systems,"
by Vadym Mukhin and Artem Volokyta
in the Proceedings of the 2011 IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), vol.2, September 2011, pp.737-742

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

"Towards a Cloud-specific Risk Analysis Framework"
by Bernd Grobauer, Tobias Walloschek, Elmar Stocker
in Siemens IT Solutions and Services Monograph, Publication Date: 2010, pp. 1-24

This paper devoted to the analysis of a cloud-specific vulnerabilities and risk analysis in the cloud systems. There are described the main characteristics of cloud systems and a reference architecture of cloud computing. Also, there is suggested the special estimations for the risk analysis, which are based on the preliminarily vulnerabilities analysis. The proposed approach allow to estimate the influence of the various factors on the effective risk level and to formulate the requirements to the security methods and mechanisms.

Published in:

Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2011 IEEE 6th International Conference on  (Volume:2 )

Date of Conference:

15-17 Sept. 2011